cisagov / docker-kali-ansible
A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.
☆13Updated 2 months ago
Alternatives and similar repositories for docker-kali-ansible:
Users that are interested in docker-kali-ansible are comparing it to the libraries listed below
- ☆15Updated 5 years ago
- ☆15Updated 3 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated 2 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- Hardened Windows Server image☆18Updated 5 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆13Updated 4 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- Microsoft Windows Server 2019 STIG InSpec Profile☆14Updated 2 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 3 months ago
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- ☆11Updated 6 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated last year
- A low/zero interaction ssh authentication logging honeypot☆20Updated 6 months ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Create machine images containing the Guacamole remote desktop gateway☆10Updated 3 weeks ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 6 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- ☆21Updated last year